Infosecurity White Papers

  1. Transforming Security Operations with Automated Detection & Response

    Transforming Security Operations with Automated Detection & Response

  2. Forged Email Protection

    An analysis of email forgery techniques and protection methods available in Trend Micro SaaS email security products

  3. Enhancing your Penetration Testing Regime

    This whitepaper explores how utilizing red-team or objective-oriented penetration testing services can provide increased insight into the security posture of an organization, its susceptibility to varying degrees of attack and its ability to detect and respond to such an attack.

  4. 20 Steps to GDPR Compliance - A Methodical, Systematic and Logical Approach

    20 steps to GDPR compliance – A methodical, systematic and logical approach: The General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive 95/46/EC in May 2018.

  5. The Definitive Email Security Strategy Guide

    Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

  6. Email Impersonation Is Rampant - One in Five Messages Cannot Be Trusted

    Without email authentication, fraudsters can easily impersonate any domain simply by putting it into the From field of their messages.

  7. Patient-Centric Data Protection

    Real World Scenarios of Stopping PHI Theft with DLP

  8. Building a Threat Intelligence Program

    Turn tactical use cases into a strategic TI capability.

  9. Social Media Protection for Dummies

    Learn how to build an effective social media protection program.

  10. Navigating the Evolving Threat Landscape with a More Complete Approach to Network Security

    How targeted attacks are changing the network security landscape.

  11. Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter

    This Technology Spotlight highlights how hybrid cloud architectures, underpinned by the growth of cloud computing and virtualization, has transformed the way organizations should view server security.

  12. Strengthening the Security Foundation of Cryptography

    An overview of cryptographic randomness requirements for the data center/cloud, the limitations of previous methods, and Whitewood’s solution.

  13. The Definitive Guide to Sharing Threat Intelligence

    Download this whitepaper to learn the main points for consideration in regards to sharing threat intelligence.

  14. A New Approach to Sensitive Data

    Download this whitepaper to understand the provisions introduced by the regulation concerning "sensitive data" and what are the rights of the Controller vs the Personal Data Stakeholder.

  15. Managed Detection & Response

    Why a cost-effective MDR service can significantly enhance your ability to rapidly respond to threats and breaches

  16. The Value of Threat Intelligence

    The Second Annual Study of North American & United Kingdom Companies

  17. A Best Practice Guide to Mitigating Ransomware in Your Enterprise

    Learn 4 simple best practices that you can implement to prevent ransomware attacks in your enterprise.

  18. Analysis of the Global Public Vulnerability Research Market

    Growth of public vulnerabilty disclosures the important intermediary between commercial threat analysis and cyber grid threat reporting

  19. Minimize Ransomware's Impact

    with Cloud-based Prevention, Continuity, and Recovery

  20. Ransomware 2017 Report

    How can companies block ransomware attacks before ransom is demanded, and their data along with their reputation is put at risk.

What’s hot on Infosecurity Magazine?